Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags:

Posts Tagged ‘For IT Admins’

February 13th, 2018

In today’s always-connected world it’s important to realize that, historically and traditionally, cybersecurity was the responsibility of the IT department. Any time a cyber incident or data breach occurred or security questions arose, these got deferred to IT for the answers. Failure to translate cyber risk into business risk has left many businesses clueless But…

January 10th, 2018

2017 was a record year for cyber security with breaches and hacks making headlines just about every day. Thank you for following along with the 2017 chaos as we captured the biggest breaches, security nightmares, and attacks. As a recap, here are the “Top 10” posts from the blog, sorted in increasing order based on readership. Let the countdown begin! #10: How…

January 3rd, 2018

Author Note: These are all 3rd party tools that have been recommended to me by peers and experts in the field. With that said, Thycotic does NOT endorse any of these: please explore and use at your own risk. Email Encryption Tool OpenPGP – An open source encryption protocol used by many clients for providing…

November 30th, 2017

Do you want to enable auto logon on your PoS systems without compromise? Do you need to enable auto logon for a seamless buying experience for your customers, but you’re doing it in an unsecure way? Well, Thycotic’s Secret Server has the answer, with complete automation, and without storing credentials in cleartext. Let’s talk about…

September 7th, 2017

What is PuTTY? PuTTY is an open source application that allows you to connect remotely to many different types of systems, over various communication protocols. However, PuTTY is most famously used for SSH connects from Windows systems to Unix based systems. This application allows you to connect your private SSH keys and enter passphrases…

July 19th, 2017

Automating Compliance Reporting: When privileged account management tasks are being done manually, compliance reporting gets complicated. Yet many organizations must demonstrate compliance and provide evidence to auditors and other reviewing bodies to prove that security policy requirements are being met. In this 5-part Thycotic educational series, we focus on five areas of Privileged Account Management…

July 14th, 2017

CyberArk’s latest preliminary earning report and investor reactions show they’re starting to lose sight on what the market is looking for. For years CyberArk has been the biggest and, in many cases, the only player in the Privileged Account Management space. When you’re one of the first to market, it gives you a lot of…

July 7th, 2017

Join us in celebrating the best day of the year—System Administrator Appreciation Day 2017! The official SysAdmin Day day isn’t until the 28th – the last Friday of July. But we want to make sure that every sysadmin gets a little thank you from our team. Let’s face it, 364 days out of the year…

July 5th, 2017

Automating SSH Key Management: Management of SSH keys can be tough, especially if best practices require the keys to be updated periodically, or when someone who possesses some of the keys leaves the company. Manual management is a daunting task, yet many SSH key management tools are limited in their capabilities. In this 5-part Thycotic…

June 22nd, 2017

Automating Team Password Sharing: Sharing access to admin accounts across an organization is a challenge. But with proper automation in place your users know exactly what systems they can access and which accounts they can use to access those systems—a proverbial “one-stop shop” to conduct their work fast and securely. In this 5-part Thycotic educational…